Sökning: "Shamir’s Secret Sharing"

Hittade 5 uppsatser innehållade orden Shamir’s Secret Sharing.

  1. 1. Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents

    Master-uppsats, KTH/Radio Systems Laboratory (RS Lab)

    Författare :Nathanael Eneroth; [2018]
    Nyckelord :LTE; VoLTE; LBO; Lawful Intercept; Multiple Escrow Agents; Shamir’s Secret Sharing; LTE; VoLTE; LBO; laglig avlyssning; flera Escrow Agents ; Shamirs krypteringsmetod;

    Sammanfattning : The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. LÄS MER

  2. 2. A secure multi-party scheme with certificateless cryptography for secret key extraction

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Dennis Fokin; [2018]
    Nyckelord :multi-party computation; secret sharing; certificateless cryptography; cryptography;

    Sammanfattning : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. LÄS MER

  3. 3. Mobility-based Key Sharing Using Visible Light Communication

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Isabelle Enlund Åström; [2017]
    Nyckelord :;

    Sammanfattning : Visible Light Communication (VLC) has become an increasingly interesting topicamong researchers. The LEDs used in VLC have important characteristics which differfrom radio waves, and which enables a vast spectrum to be used with many security aspects. Light cannot pass through walls and can be directed. LÄS MER

  4. 4. Sending Location-Based Keys Using Visible Light Communication

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Abdalah Hilmia; [2016]
    Nyckelord :;

    Sammanfattning : In this thesis we explore the possibilities of using Visible Light Communication (VLC) to build a system that is capable of securely sharing small amounts of data in the form of encryption keys in a boundary defined area. We design and implement the MAC and Physical layers of the system. LÄS MER

  5. 5. Multiple Escrow Agents in VoIP

    Master-uppsats, KTH/Kommunikationssystem, CoS

    Författare :Abdullah Azfar; [2010]
    Nyckelord :Key escrow; VoIP; Law Enforcement Agency; Multiple Escrow Agents; Threshold Cryptography; Reliability; Availability; Shamir s Secret Sharing;

    Sammanfattning : Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, the use of a single escrow agent has some drawbacks. LÄS MER